Sciweavers

1134 search results - page 187 / 227
» Analyzing Mapping Extraction Approaches
Sort
View
120
Voted
KAIS
2010
139views more  KAIS 2010»
15 years 2 months ago
Periodic subgraph mining in dynamic networks
In systems of interacting entities such as social networks, interactions that occur regularly typically correspond to significant, yet often infrequent and hard to detect, interact...
Mayank Lahiri, Tanya Y. Berger-Wolf
144
Voted
IDEAS
2010
IEEE
141views Database» more  IDEAS 2010»
15 years 1 months ago
Modeling synchronized time series
Abstract. We consider the class of applications that manage time series (TS) and propose a data model and a query language that let these applications manipulate TS data sets at a ...
Zoé Faget, Philippe Rigaux, David Gross-Amb...
127
Voted
ICMCS
2009
IEEE
168views Multimedia» more  ICMCS 2009»
15 years 1 months ago
Human activity recognition based on the blob features
In this paper, we present a novel approach for human activities recognition in the video. We analyze human activities in the sequential frames because human activities can be cons...
Jie Yang, Jian Cheng, Hanqing Lu
145
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 10 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
161
Voted
RE
2010
Springer
14 years 10 months ago
Feature Unweaving: Refactoring Software Requirements Specifications into Software Product Lines
The design of the variability of a software product line is crucial to its success and evolution. Meaningful variable features need to be elicited, analyzed, documented and validat...
Reinhard Stoiber, Samuel Fricker, Michael Jehle, M...